Recent Searches
MASCO Code
1511-03
Compare
Chief Information Security Officer
STEM
Chief Information Security Officer responsible for developing and implementing an information security program, which includes procedures and policies designed to protect enterprise communications, systems and assets from both internal and external threats.
Alternative Names
Tasks
Analyzing IT security threats in real-time and mitigating these threats
Ensuring that newly-acquired technology complies with the IT security regulations
Planning, designing, and implementing an IT and network strategy for the company
Performing related tasks
Managing, planning, scheduling and monitoring the assignments of other employees
Monitoring the selection, training, and performance of staff
Controlling budget allocation and departmental or organizational expenses
Representing the department in its dealings with other parts of the organization or with external agencies
Assessing the use and needs of the organization's technology and suggests improvements such as upgrading computer hardware and software
Managing the continuous maintenance of the IT network to ensuring optimum security levels are maintained
  • M
    Professional, Scientific And Technical Activities
  • J
    Information And Communication
  • O
    Public Administration And Defence, Compulsory Social Activities
  • J620-001-5:2019
    Cyber Security Penetration Testing & Assessment
  • FB-081-5:2012
    Information Systems Management
  • IT-030-5:2013
    Computer Network Management
  • IT-090-5
    ICT System Security Technologist
  • 0611
    Information Technology and Information System
  • 0612
    Software Engineering
  • 0613
    Computer Science
  • 0614
    Computer Use
Skills
Asas
Basic ICT
proficiency in using computers to retrieve, access, store, produce, present and exchange information.
Critical Thinking
Proficiency in using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems. 
Monitoring
Proficiency in monitoring/assessing performance of yourself, other individuals, or organisations to make improvements or take corrective action.
Decision Making
proficiency in choosing between two or more alternatives.
Reading Comprehension
Proficiency in understanding written sentences and paragraphs in work related documents.
Khusus
ICT Literacy
ability to search, analyze, evaluate, organize, create, use, manage and communicate information to solve ICT problems.
Network Security
proficiency in protecting of the underlying networking infrastructure from unauthorized access, misuse, or theft.
Machine Learning
proficiency in application of artificial intelligence (AI) that provides systems the ability to automatically learn.
Coding
proficiency in computer language used to develop apps, websites, and software.
Cybersecurity Assessment
proficiency to identify cybersecurity risk level and determine the maturity of their cybersecurity programs.
Database Administration
proficiency in managing and maintaining database management systems (DBMS) software.
Data Management Protection
proficiency in management and monitoring of data backup and protection services of a computer network or IT environment.
Data Design and Migration
proficiency in designing database model and migrating the data from source databases to target databases
Penetration Testing
proficiency in simulating cyber attack against computer system to check for exploitable vulnerabilities.
Center Image